Skip to main content
Toggle navigation
Contact Us
Log in
For Authors
Category
Arts & Photography
Biographies & Memoirs
Business & Money
Children's eBooks
Comics, Manga & Graphic Novels
Computers & Technology
Cookbooks, Food & Wine
Crafts, Hobbies & Home
Education & Teaching
Engineering & Transportation
Foreign Languages
Health, Fitness & Dieting
History
Humor & Entertainment
Law
LGBTQ+ eBooks
Literature & Fiction
Medical eBooks
Mystery, Thriller & Suspense
Nonfiction
Parenting & Relationships
Politics & Social Sciences
Reference
Religion & Spirituality
Romance
Science & Math
Science Fiction & Fantasy
Self-Help
Sports & Outdoors
Teen & Young Adult
Travel
Search
Security & Encryption
Categories
All categories
Computers & Technology
Security & Encryption
Encryption
Networking
Online Safety & Piracy
Viruses & Malware
Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, ... Computer and Information Science Book 821)
Data Privacy for the Smart Grid
Rebecca Herold, Christine Hertzog
How to Hack a Human: A Brief Introduction
Raef Meeuwisse
Tracer: A gripping thriller full of intrigue and suspense (Korso Thrillers Book 1)
Jason Dean
Information Security Governance Simplified: From the Boardroom to the Keyboard
Todd Fitzgerald
Unauthorized Access: The Crisis in Online Privacy and Security
Robert Sloan, Richard Warner
A Simpler Guide to Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for ... and other Google services (Simpler Guides)
Ceri Clark
Sicurezza informatica. 10 cose da non fare mai (Italian Edition)
Zonin Renzo, Bonanomi Gianluigi
Challenges in Cybersecurity and Privacy - the European Research Landscape
Jorge Bernal Bernabe, Antonio Skarmeta
Data Spaces: Design, Deployment and Future Directions
Edward Curry, Simon Scerri, Tuomo Tuikka
Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings (Lecture Notes in Computer Science Book 13553)
Robert Krimmer, Melanie Volkamer, David Duenas-Cid, Peter Rønne, Micha Germann
Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling
Julius Holderer
Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected Papers ... Computer and Information Science Book 1596)
Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos
Buy Bitcoin, You'll Thank Yourself In The Future: A book about Bitcoin by BBCD Satoshi
BBCD Satoshi
Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers (Communications in Computer and Information Science Book 1699)
Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li
Advanced Digital Auditing: Theory and Practice of Auditing Complex Information Systems and Technologies (Progress in IS)
Egon Berghout, Rob Fijneman, Lennard Hendriks, Mona de Boer, Bert-Jan Butijn
Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science Book 1683)
Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson
Archives and Records: Privacy, Personality Rights, and Access
Mikuláš Čtvrtník
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao
Multimedia Forensics (Advances in Computer Vision and Pattern Recognition)
Husrev Taha Sencar, Luisa Verdoliva, Nasir Memon
Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers (Communications in Computer and Information Science Book 1506)
Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Advances in Computer Vision and Pattern Recognition)
Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch
The Future of Financial Systems in the Digital Age: Perspectives from Europe and Japan (Perspectives in Law, Business and Innovation)
Markus Heckel, Franz Waldenberger
Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools (Lecture Notes in Computer Science Book 13300)
Joanna Kołodziej, Matteo Repetto, Armend Duzha
Modern Socio-Technical Perspectives on Privacy
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano
Handbook of Vascular Biometrics (Advances in Computer Vision and Pattern Recognition)
Andreas Uhl, Christoph Busch, Sébastien Marcel, Raymond Veldhuis
International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019 (Mathematics for Industry Book 33)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, ... Notes in Computer Science Book 10356)
Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
The Ethics of Cybersecurity (The International Library of Ethics, Law and Technology Book 21)
Markus Christen, Bert Gordijn, Michele Loi
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Raghuram Yeluri, Enrique Castro-Leon
Online Safety: Scams, SPAM, Viruses and Clouds (Cyber Security Community Book 1)
A. M. Perry
Cybersecurity. Simplified. : There Are Only Three Things You Need To Know
T. Delon Lukow
Managing Risk and Information Security: Protect to Enable (Expert's Voice in Information Technology)
Malcolm Harkins
Managing Risk and Information Security: Protect to Enable
Malcolm W. Harkins
Introduction to cyber security: stay safe online
The Open University
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Dan Blum
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ... (Simula SpringerBriefs on Computing Book 4)
Olav Lysne
Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers (Communications in Computer and Information Science Book 970)
Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou
Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields
Atsuko Miyaji, Tomoaki Mimoto
1
2
next ›
last »
Featured Books
Carpe DiEmily (Part 1)
Riley J. Ford
Romance: Simone: Adventures in Dating (Book 1: The Billionaire) (Simone Series)
Riley J. Ford
The Fifth Vital: A Prelude
Mike Majlak, Riley J. Ford
Free Books For Free
is an author-approved catalog of all the free Ebooks on Amazon. Start reading on your Kindle or tablet now!
Popular Books
The Reminiscences of an Astronomer
Simon Newcomb
Without Warning! 2 (Tsunami)
Jeremy Barlow
First Plays
A. A. (Alan Alexander) Milne
Paul Prescott's Charge
Horatio Alger